The Inception integrated access and security system may be the entry-level product. But Inner Range gives it the same love and attention when it comes to updates and enhancements as the enterprise products.

2FA

The latest version of Inception supports two-factor authentication, usually known as 2FA. This means operators have to present their usual name and password, as well as an additional time-based one-time passcode (TOTP) by using Google’s Authenticator app, or another compatible app. The use of 2FA provides another layer of security and means that even if credentials are stolen, a rogue user still can’t gain access.

Dynamic user imports

Inception can also automatically import new user data from CSV files in external systems, such as booking or payroll. These are uploaded to the Inception controller, while user credentials can also be manually added, updated, or canceled based on existing information in another system. This helps reduce valuable time and resource in creating and updating credentials.

Ethernet bridge

Inner Range LAN Ethernet bridge module provides a convenient interface for connecting RS-485 LAN modules

The Inner Range LAN Ethernet bridge module provides a convenient interface for connecting RS-485 LAN modules to an Integriti or Inception controller via a standard TCP/IP network.

Key Features of the LAN Ethernet bridge module are:

  • Connect RS-485 LAN over TCP/IP Ethernet network
  • Compatible with Integriti and Inception
  • Communicates directly with controller – no master/slave configuration
  • Reduces configuration requirements
  • Heavily reduces hardware requirements
  • Allows RS-485 expansion via IP infrastructure
  • Over-The-Wire firmware upgradeable
  • AES 128-Bit Encryption
  • The remote configuration included via Ethernet LAN configuration tool

More benefits

  • Inception offers powerful access and security, perfect for single sites and small businesses.
  • It requires no software and is easy to program, test, and commission.
  • It comes with Grade 3 intruder detection to European Standard EN50131 as well as offering extra functionality, such as automated lighting, heating, and air conditioning, and the ability to integrate with biometric credentials.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

In case you missed it

What Are Emerging Applications For Physical Security In Transportation?
What Are Emerging Applications For Physical Security In Transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher's Perimeter Solutions With Fortified Partnership
Gallagher's Perimeter Solutions With Fortified Partnership

Global security manufacturer Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years o...

Genetec's Role In Data Sovereignty For Security
Genetec's Role In Data Sovereignty For Security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...